PT-2025-1051 · Fortinet · Fortiproxy +1
Published
2025-01-14
·
Updated
2025-07-16
·
CVE-2024-55591
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
Fortinet FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12
**Description:**
This vulnerability is an authentication bypass that allows a remote attacker to gain super-admin privileges by sending specially crafted HTTP requests to the Node.js websocket module. The vulnerability has been actively exploited in the wild, with reports indicating exploitation as early as November 2024. Approximately 50,000 Fortinet devices were reported as vulnerable as of January 22, 2025. Exploitation can lead to the creation of administrative accounts and potential lateral movement within a network. The vulnerability is actively being discussed on underground forums, with exploit code available. Ransomware groups, including RansomHub, have been observed leveraging this vulnerability for initial access.
**Recommendations:**
FortiOS versions prior to 7.0.17 and FortiProxy versions prior to 7.2.13 are vulnerable. Upgrade to a supported version to address this issue. Review firewall policies and VPN group memberships for any unauthorized changes. Monitor logs for suspicious activity, including unusual admin account access and requests to the `/api/v2/` endpoint. Consider disabling the vulnerable Node.js websocket module as a temporary workaround.
Exploit
Fix
Authentication Bypass Using an Alternate Path or Channel
Weakness Enumeration
Related Identifiers
Affected Products
References · 350
- 🔥 https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591⭐ 63 🔗 13 · Exploit
- 🔥 https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591⭐ 20 🔗 8 · Exploit
- https://bdu.fstec.ru/vul/2025-00281 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/716832 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55591 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2024-55591 · Security Note
- https://fortiguard.fortinet.com/psirt/FG-IR-24-535 · Security Note, Vendor Advisory
- https://github.com/eSentire/iocs⭐ 37 🔗 1 · Note
- https://twitter.com/TheMsterDoctor1/status/1935038129414750579 · Twitter Post
- https://twitter.com/princechaddha/status/1909879678891860294 · Twitter Post
- https://twitter.com/spyANTIspy/status/1900486210306310270 · Twitter Post
- https://twitter.com/DarkWebInformer/status/1935022250664566983 · Twitter Post
- https://reddit.com/r/k12cybersecurity/comments/1ioj9rb/updated_msisac_cybersecurity_advisory_multiple · Reddit Post
- https://t.me/c/2108087364/10417 · Telegram Post
- https://t.me/c/1524188931/2490 · Telegram Post